Description
Ethical Hacking: Cryptography for Hackers
You will learn about message authentication, virtual private networking, Windows encryption, advanced cryptology, and so much more! Length: 1.5 hrs
Ethical Hacking: Cyber Anonymity
You will start by understanding network anonymity by using tools such as Tor, Tortilla and Proxy Chains. By the time you’ve completed this course, you will know all about IP Spoofing, MAC Spoofing, email security, and more. Length: 2.5 hrs
Ethical Hacking: Hacking Applications
Start by understanding network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret. By the time you’ve completed this course, you will know all about XSS attacks, buffer overflows, hacking AJAX and more. Length: 1.5 hrs
Ethical Hacking: Hacking Databases
Start by understanding the importance of database security, and then move on to utilizing MySQL for Lab Buildout, Lockdown, and Security Architecture. By the time you’ve completed this course, you will know all about Shodan, operating system hardening, and even big data security. Length: 2 hrs
Ethical Hacking: Honeypots, IDS and Firewalls
You will start by learning about Intrusion Detection Systems (IDS), and then move on to topics such as Snort, Honeydrive installation, and advanced perimeter security. By the time you’ve completed this course, you will know all about firewalls, LAN security, threat management, and even DNSSec. Length: 1.5 hrs
Ethical Hacking: Malware Development
The course starts with an introduction to malware, and then covers topics such as Internet Worm Maker, JPS Virus Maker, and Ghost Eye. By the time you’ve completed this course, you will know how to create a custom trojan, perform a static malware analysis, and so much more! Length: 1 hrs
Ethical Hacking: Recon and Footprinting
Start by learning about website and e-mail footprinting, and then move on to topics such as port inspection with Netstat, Nmap and Metasploit, and Maltego. By the time you’ve completed this course, you will know how to perform a SNMP probe and SMTP inspection, and so much more! Length: 1 hrs
Ethical Hacking: Social Engineering
Start with an introduction to social engineering, and then move on to topics such as PayPal phishing and the Browser Exploitation Framework. By the time you’ve completed this course, you will know all about cyber attacks, security for both HR and personnel, and so much more. Length: 1 hr
Ethical Hacking: Wireless Hacking
Start with an introduction to wireless hacking, and then move on to topics such as Aircrack, Reaver, Bluetooth, and Ubertooth. By the time you’ve completed this course, you will know all about advanced wireless security, Kismac, Metasploit, and much more. Length: 1.5 hrs